---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: SUSE Update for Multiple Packages SECUNIA ADVISORY ID: SA22588 VERIFY ADVISORY: http://secunia.com/advisories/22588/ CRITICAL: Highly critical IMPACT: Unknown, Spoofing, Brute force, Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: SuSE Linux 9.1 http://secunia.com/product/3473/ SUSE Linux 9.2 http://secunia.com/product/4258/ SUSE Linux 9.3 http://secunia.com/product/4933/ SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 10 http://secunia.com/product/6221/ openSUSE 10.2 http://secunia.com/product/13375/ SuSE eMail Server 3.x http://secunia.com/product/1168/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ SuSE Linux Database Server http://secunia.com/product/1178/ SuSE Linux Standard Server 8 http://secunia.com/product/2526/ SuSE Linux Openexchange Server 4.x http://secunia.com/product/2001/ SuSE Linux Office Server http://secunia.com/product/1172/ SuSE Linux Firewall on CD/Admin host http://secunia.com/product/1179/ SuSE Linux Enterprise Server 7 http://secunia.com/product/1170/ DESCRIPTION: SUSE has issued an update for multiple packages. This fixes some vulnerabilities, where some have unknown impacts and others can can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct spoofing attacks, cause a DoS (Denial of Service), and compromise a vulnerable system. For more information: SA24234 SA24732 SA25123 SA25306 SA25677 SA25740 SA25833 SA25855 SA26038 SA26050 SA26074 SA26099 SA26130 SA26138 SA26188 SA26257 SOLUTION: Updated packages are available via YaST Online Update or via the SUSE FTP server. ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00003.html OTHER REFERENCES: SA24234: http://secunia.com/advisories/24234/ SA24732: http://secunia.com/advisories/24732/ SA25123: http://secunia.com/advisories/25123/ SA25306: http://secunia.com/advisories/25306/ SA25677: http://secunia.com/advisories/25677/ SA25740: http://secunia.com/advisories/25740/ SA25833: http://secunia.com/advisories/25833/ SA25855: http://secunia.com/advisories/25855/ SA26038: http://secunia.com/advisories/26038/ SA26050: http://secunia.com/advisories/26050/ SA26074: http://secunia.com/advisories/26074/ SA26099: http://secunia.com/advisories/26099/ SA26130: http://secunia.com/advisories/26130/ SA26138: http://secunia.com/advisories/26138/ SA26188: http://secunia.com/advisories/26188/ SA26257: http://secunia.com/advisories/26257/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------